10 mins
What is Tor? How does it work, and is it safe...
We explain how Tor Browser works, how to use and contribute to it, and the many other things Tor enables us to do online.
8 mins
Phone number generators: Secure, private, and free options explained
A phone number generator is a tool that provides you with an alternate phone number—often temporary—to use in place...
11 mins
How to file a Navy Federal fraud claim and get your...
So, you’ve glanced at your Navy Federal account and noticed something is off. Maybe there’s a charge you didn’t...
22 mins
What is a Wi-Fi VPN and why you should use one
We’ve all done it—connected to a random café’s Wi-Fi, scrolled through emails at the airport, or jumped online from...
15 mins
How to know if you have a hacked webcam (and how...
Six ways to know if someone is watching you with your laptop’s camera.
17 mins
What is netiquette? 10 essential online etiquette rules
People often behave differently online than they do in real life. Still, many internet users follow a kind of social...
11 mins
Net neutrality: Everything you need to know
Imagine if your internet service provider (ISP) operated like a cable TV provider. You’d have a set of websites...

Featured

Featured video

Top 10 video games that will change how you view privacy
Play through our picks for some of the best video games about hacking, surveillance, and privacy.